Gambling with DR policy during the recession

  • Published in

By James Carnie, Head of Solutions Architecture, Adapt.

Read More

Unified Communications is much more than a set of communication tools

  • Published in

Three ways UC delivers ROI through optimised business processes.

Read More

The future of virtualisation: automation, orchestration and even more on demand

  • Published in

By Alex Moore, director of technology and engineering, NTT Europe.

Read More

AWS encryption

  • Published in

SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt Amazon EC2 workloads and maintain full ownership of encryption keys, with no need for on-premise hardware. SafeNet ProtectV with Virtual KeySecure is now available to run entirely on Amazon Web Services (AWS) infrastructure and is compatible with AWS CloudHSM, allowing customers to retain full ownership of their encryption keys while deploying entirely in the cloud. Through the AWS Marketplace,...

Read More

DNUK releases Zetavault 3.0 ZFS storage platform

  • Published in

New version includes full integration of OpenZFS.

Read More

Acronis True Image 2014 updated for Windows 8.1 Certification

  • Published in

Top-selling solution for complete image backups and full system recovery is now certified compatible with Windows 8.1.

Read More

Druva has published the results of the 2020 Value of Data Report. The report offers insights from...
‘Tenor’ a 64 qubit device, provides more than twice the number of qubits at a 10x lower price...
Data Science Platform boosts infrastructure behind NetApp’s Active IQ solution, responding in...
Panasas has introduced ActiveStor® Ultra, the next generation of its high-performance computing...
Company details progress towards driving a sustainable, inclusive, and ethical datasphere in its...
With a fifth acquisition in two years, StorCentric delivers on strategic vision with a...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more